We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in. We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Marin Technologies, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

If you have questions about whether or not our IT services platform is right for your business, simply complete and submit this form and one of our trusted IT professionals will promptly respond to your query!

*Email

*First Name

*Last Name

*Phone

Comments

What Our Clients Say

I don’t know if I can say enough about Marin Technologies.

President, Concordia Finance, Inc. / Rancho Cucamonga

I don’t know if I can say enough about Marin Technologies. I have known Steve Marin for 8 years. He was working for another company at the time but still made us feel like his only client. He even recommended a person to be our in house I.T. manager. The relationship continued as an additional source for our I.T. issues. When our I.T. manager left the company, Marin Technologies had been established. It was an easy decision to make the transition.

Marin Technologies treats me like I am their only and most special client.

President, Accredited Tax, Inc. / Chino, CA

The uniqueness I have experienced is one of being treated like I am their only and most special client. The response time and willingness to help and wide range of knowledge of technology is beyond my expectations of any firm.

Wait, How Old?

When your computer ages, it begins to slow down. When your computer begins to slow down, so does productivity. Let’s dive into how you can determine the age of your computer.

Most computers will have an identification number, and typically a date associated with it. Most of the time these are right on the case. If there’s no date provided with the serial number, a quick search will typically give you a general idea of its age.

You can also check the components on your computer - but not by opening the case. You can do this by using the system information tool on your desktop. In the Search Windows box, type in “sysinfo” or sometimes just System Information. In the window that appears, you will be able to access plenty of information to help you date the machine in question. For instance, if the BIOS of the device has never been upgraded, the date will likely tell you how old your computer is.

This dating process will give you a better idea of whether your computer’s latency is related to its age, or some other issue.

Dinosaurs Belong in History

There are numerous signs that signify your computer should be retired. While some of these are obvious, some are less detectable. Let’s start with the obvious.

Your computer is massive - Devices in the modern age have drastically reduced in size. Upon first release, a computer was humongous. Now, you’re able to hold an entire computer in the palm of your hand. If your computer is on the bulkier side, chances are it is an old device.

Starting/Shutdown take considerably longer - A few factors could contribute to long wait times upon startup and shutdown. However, generally this is an indicator that your device could be outdated. Recent introduction of SSD’s dramatically improve startup times. Once you boot up with an SSD, you’ll never want to go back to waiting 30 seconds to sometimes even two minutes or more without one.

Compatibility is limited - If you’ve gone to install an application and are limited by your computer’s hardware or software, an upgrade should be in your near future.

Noise...and lots of it - If your computer makes a considerable racket, chances are your computer is infested with dust. While a good cleaning might help lower operating temperatures, this is a clear indicator that your computer (or at least its fan) needs to be upgraded.

It is highly recommended that devices be upgraded every 4 years. Outdated hardware and software leave your business more susceptible to security threats, and device failure. Our experts at Marin Technologies have the contacts to help you procure the equipment you need to sustain, and improve productivity. Call us at (208) 329-6792 to learn more information.

Tip #1: Routine/Emergency Procedures

Having a procedure is the best way to promote organization in your business. Routine patches can have a predetermined day of the month, even down to the exact minute patches will begin to be installed. With a routine patch process, it is likely that your business will stay free of vulnerabilities.

However, in the event that an impending threat is evident; an emergency patch procedure will ensure your business is prepared. While patch management might not be the most prioritized business concern, it is better to be prepared.

These emergency patches, and all routine patches should be thoroughly tested.

Tip #2: Testing

Testing is the most underthought process regarding patches. If a patch is available, typically a business will download them without hesitation, and without testing. How can you be certain the patch you are installing will not impede with your business’ productivity? In a word, testing.

Testing does not require you to pull all of your staff from their projects and begin testing every time a patch is available. A simple virtualized environment, where the patch can be implemented and stress tested, is all it takes. However, testing should be given enough time to produce trustworthy results. Simply applying a patch and waiting a few minutes without opening the application the patch was produced for, doesn’t qualify as a successful test instance.

Without any sort of testing, you just don’t know how well the patch will work, or if it will interfere with another process.

Tip #3: Track Patch Releases

Microsoft famously hosts Patch Tuesday. This is typically the second or fourth Tuesday of each month, depending on the patching needs. Other manufacturing companies also release their patches on (sometimes) predictable schedules. Being informed on release dates allows your business to set up procedures which synchronize with your hardware or software brands.

All businesses should prioritize security. Hoping your business doesn’t fall victim to a network breach is not an approach that is acceptable, no matter the size of the business. Putting your in-house most computer savvy employee in charge of your network security might seem like a cost-effective strategy, but what inexperienced IT personnel do not realize is the sheer quantity of threats attempting to plague your business.

Whilst discussing wireless networking, typically trained IT staff is deterred from the inconvenience of setting up all the hardware associated with Wi-Fi. However wireless internet has become easier to install, faster to install, and a data breach via wireless network is exponentially less likely than it used to be, if set up correctly. Today we will discuss the thought process and course of action your business should take if implementing Wi-Fi.

Identifying Need

Wi-Fi has very clear pros and cons. A wireless network is a much more cost-effective strategy than running individual wires to each device requiring a network connection. It allows for greater mobility by not tethering a user to an ethernet cable. Greater mobility fuels collaboration and flexibility. However, the need for network connections should not compromise security, and data sent over a Wi-Fi connection is more vulnerable to threats as opposed to a wired connection. Understanding that a more vigilant eye is required when establishing a wireless network is the first step in ensuring your business is not increasing vulnerability.

Usability Radius

What’s worse, your wireless network not reaching where you want it to, or it reaching outside the confines of your office? Part of establishing a plan to implement a Wi-Fi connection is examining where ideal access point locations are. Your business should identify where coverage is needed, and where it is not wanted.

Usage

While you might be satisfied with your newly implemented Wi-Fi connection, it isn’t uncommon for too many users to slow down, or worse shut down a connection. Estimating your organization’s bandwidth needs is a critical step in preparing. Too many users on not enough bandwidth will decrease productivity, which is the exact opposite reason you planned on implementing a wireless network in the first place.

Hardware

Wi-Fi isn’t something we’re able to see, so where does it come from? Selecting hardware that will transmit your wireless network, of course, is determined by first establishing your business needs. You get what you pay for when it comes to hardware, so if you decide on a cheaper alternative you will have to expect slower internet speeds. An 802.11B is capable of transmitting Wi-Fi and won’t break the bank, however for higher speed wireless transmission an 802.11A or 802.11G is ideal.

Implementation

Installing a network which will be transmitting critical data is not something that should be rushed. Before following through with an installation, site survey testing will allow your business to precisely locate where the ideal location for your hardware is in your office.

Security

Once all of your research has been completed and you understand the needs of your business down to the approximate bandwidth that will be used, and hardware that will fit the needs of your users; it’s time to turn to the professionals. Marin Technologies is your local IT expert when implementing a new network. Our experts know how to control a system's security, and understanding the best practices in order to safely integrate a new network. Changing SSID settings, filtering options, and setting up authentication are things that need to be done, but shouldn’t be changed without proper experience and training.

Deployment

Once your network has been optimized with security in mind, it is time to add users who are able to access this new network. Whitelisting devices you want to allow is a much more efficient method rather than blacklisting anyone, and any devices you don’t want access given to. Marin Technologies can save your business a lot of time by doing this for you, ensuring it is done correctly.

If you would like assistance setting up your business’ Wi-Fi network, call your local experts at (208) 329-6792.

Think about how much office technology has changed over just the last 10 years. Remember those bulky, 60-pound CRT monitors? Remember thinking a 32” screen was a TV, not a computer monitor? While you more than likely have replaced those old computer monitors, what is the sta...

Marin Technologies is proud to announce the launch of our new updated and imroved website at https://www.marintechit.com The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.